What are the different types of sap security tables?
What authorization is required to create and maintain user master records?
Which tables will you use for making customizing setting for security administration?
In which table you can see authorization group for table and which table to see authorization group for program?
How to find ECC system, GRC system and BI system ?
What are the 5 things you'll do if you have sap system to maintain (Sap securiy)
1 Answers Accenture, Ernst Young,
How to trace a Report User (Business User) in SAP BI?
If we have UK roles in our system and we want to find the AUS australian role how you will find the same
Hi, I want to import my Transport request from DEV. to Test system (from STMS buffer of DEV.(domain only) but I don’t want Login/PWD screen while importing from DEV to Test System. But I need login/pwd screen while importing TR from Test to PRD system. Presently I have activated all systems as a non trusted systems. If any one has idea please let me know. Thanks in advance! Regards, Raj Chavan.
what reports or programs can be used to regenerate sap_all profile?
What is difference between BW and BI Security?
Hi Experts, can any one explain me the step by step process to implement security in BI/BW and what are the authorization objects we use to BI/BW , How can the security is different between R/3 and BI/BW, I appreciate your help
1.why we use derived role in sap security?2.what is the technical difference between master and derived role?